visitors.cfg.lua 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. {{ $ENABLE_AUTH := .Env.ENABLE_AUTH | default "0" | toBool -}}
  2. {{ $ENABLE_GUEST_DOMAIN := and $ENABLE_AUTH (.Env.ENABLE_GUESTS | default "0" | toBool) -}}
  3. {{ $ENABLE_RATE_LIMITS := .Env.PROSODY_ENABLE_RATE_LIMITS | default "0" | toBool -}}
  4. {{ $ENABLE_SUBDOMAINS := .Env.ENABLE_SUBDOMAINS | default "true" | toBool -}}
  5. {{ $ENABLE_XMPP_WEBSOCKET := .Env.ENABLE_XMPP_WEBSOCKET | default "1" | toBool -}}
  6. {{ $JIBRI_RECORDER_USER := .Env.JIBRI_RECORDER_USER | default "recorder" -}}
  7. {{ $JIGASI_TRANSCRIBER_USER := .Env.JIGASI_TRANSCRIBER_USER | default "transcriber" -}}
  8. {{ $LIMIT_MESSAGES_CHECK_TOKEN := .Env.PROSODY_LIMIT_MESSAGES_CHECK_TOKEN | default "0" | toBool -}}
  9. {{ $RATE_LIMIT_LOGIN_RATE := .Env.PROSODY_RATE_LIMIT_LOGIN_RATE | default "3" -}}
  10. {{ $RATE_LIMIT_SESSION_RATE := .Env.PROSODY_RATE_LIMIT_SESSION_RATE | default "200" -}}
  11. {{ $RATE_LIMIT_TIMEOUT := .Env.PROSODY_RATE_LIMIT_TIMEOUT | default "60" -}}
  12. {{ $RATE_LIMIT_ALLOW_RANGES := .Env.PROSODY_RATE_LIMIT_ALLOW_RANGES | default "10.0.0.0/8" -}}
  13. {{ $RATE_LIMIT_CACHE_SIZE := .Env.PROSODY_RATE_LIMIT_CACHE_SIZE | default "10000" -}}
  14. {{ $REGION_NAME := .Env.PROSODY_REGION_NAME | default "default" -}}
  15. {{ $RELEASE_NUMBER := .Env.RELEASE_NUMBER | default "" -}}
  16. {{ $SHARD_NAME := .Env.SHARD | default "default" -}}
  17. {{ $S2S_PORT := .Env.PROSODY_S2S_PORT | default "5269" -}}
  18. {{ $TURN_HOST := .Env.TURN_HOST | default "" -}}
  19. {{ $TURN_HOSTS := splitList "," $TURN_HOST -}}
  20. {{ $TURN_PORT := .Env.TURN_PORT | default "443" -}}
  21. {{ $TURN_TRANSPORT := .Env.TURN_TRANSPORT | default "tcp" -}}
  22. {{ $TURN_TRANSPORTS := splitList "," $TURN_TRANSPORT -}}
  23. {{ $TURNS_HOST := .Env.TURNS_HOST | default "" -}}
  24. {{ $TURNS_HOSTS := splitList "," $TURNS_HOST -}}
  25. {{ $TURNS_PORT := .Env.TURNS_PORT | default "443" -}}
  26. {{ $VISITOR_INDEX := .Env.PROSODY_VISITOR_INDEX | default "0" -}}
  27. {{ $VISITORS_MUC_PREFIX := .Env.PROSODY_VISITORS_MUC_PREFIX | default "muc" -}}
  28. {{ $VISITORS_MAX_VISITORS_PER_NODE := .Env.VISITORS_MAX_VISITORS_PER_NODE | default "250" }}
  29. {{ $VISITORS_XMPP_DOMAIN := .Env.VISITORS_XMPP_DOMAIN | default "meet.jitsi" -}}
  30. {{ $XMPP_AUTH_DOMAIN := .Env.XMPP_AUTH_DOMAIN | default "auth.meet.jitsi" -}}
  31. {{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}}
  32. {{ $XMPP_GUEST_DOMAIN := .Env.XMPP_GUEST_DOMAIN | default "guest.meet.jitsi" -}}
  33. {{ $XMPP_MUC_DOMAIN := .Env.XMPP_MUC_DOMAIN | default "muc.meet.jitsi" -}}
  34. {{ $XMPP_MUC_DOMAIN_PREFIX := (split "." $XMPP_MUC_DOMAIN)._0 -}}
  35. {{ $XMPP_SERVER := .Env.XMPP_SERVER | default "xmpp.meet.jitsi" -}}
  36. {{ $XMPP_SERVER_S2S_PORT := .Env.XMPP_SERVER_S2S_PORT | default $S2S_PORT -}}
  37. {{ $XMPP_RECORDER_DOMAIN := .Env.XMPP_RECORDER_DOMAIN | default "recorder.meet.jitsi" -}}
  38. plugin_paths = { "/prosody-plugins/", "/prosody-plugins-custom" }
  39. muc_mapper_domain_base = "v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}";
  40. muc_mapper_domain_prefix = "{{ $XMPP_MUC_DOMAIN_PREFIX }}";
  41. http_default_host = "v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}"
  42. {{ if .Env.TURN_CREDENTIALS -}}
  43. external_service_secret = "{{.Env.TURN_CREDENTIALS}}";
  44. {{- end }}
  45. {{ if or .Env.TURN_HOST .Env.TURNS_HOST -}}
  46. external_services = {
  47. {{ if $TURN_HOST -}}
  48. {{- range $idx1, $host := $TURN_HOSTS -}}
  49. {{- range $idx2, $transport := $TURN_TRANSPORTS -}}
  50. {{- if or $idx1 $idx2 -}},{{- end }}
  51. { type = "turn", host = "{{ $host }}", port = {{ $TURN_PORT }}, transport = "{{ $transport }}", secret = true, ttl = 86400, algorithm = "turn" }
  52. {{- end -}}
  53. {{- end -}}
  54. {{- end -}}
  55. {{- if $TURNS_HOST -}}
  56. {{- range $idx, $host := $TURNS_HOSTS -}}
  57. {{- if or $TURN_HOST $idx -}},{{- end }}
  58. { type = "turns", host = "{{ $host }}", port = {{ $TURNS_PORT }}, transport = "tcp", secret = true, ttl = 86400, algorithm = "turn" }
  59. {{- end }}
  60. {{- end }}
  61. };
  62. {{- end }}
  63. main_domain = '{{ $XMPP_DOMAIN }}';
  64. -- https://prosody.im/doc/modules/mod_smacks
  65. smacks_max_unacked_stanzas = 5;
  66. smacks_hibernation_time = 60;
  67. -- this is dropped in 0.12
  68. smacks_max_hibernated_sessions = 1;
  69. smacks_max_old_sessions = 1;
  70. unlimited_jids = { "focus@{{ $XMPP_AUTH_DOMAIN }}" }
  71. limits = {
  72. c2s = {
  73. rate = "512kb/s";
  74. };
  75. }
  76. authentication = 'internal_hashed'
  77. storage = 'internal'
  78. consider_websocket_secure = true;
  79. consider_bosh_secure = true;
  80. bosh_max_inactivity = 60;
  81. -- this is added to make certs_s2soutinjection work
  82. s2sout_override = {
  83. ["{{ $XMPP_MUC_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; -- needed for visitors to send messages to main room
  84. ["{{ $XMPP_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
  85. ["visitors.{{ $XMPP_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
  86. {{ if $ENABLE_GUEST_DOMAIN -}}
  87. ["{{ $XMPP_GUEST_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
  88. {{ end -}}
  89. }
  90. muc_limit_messages_count = 10;
  91. muc_limit_messages_check_token = {{ $LIMIT_MESSAGES_CHECK_TOKEN }};
  92. ----------- Virtual hosts -----------
  93. VirtualHost 'v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}'
  94. authentication = 'jitsi-anonymous'
  95. ssl = {
  96. key = "/config/certs/v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}.key";
  97. certificate = "/config/certs/v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}.crt";
  98. }
  99. modules_enabled = {
  100. 'bosh';
  101. 'ping';
  102. "external_services";
  103. {{ if $ENABLE_XMPP_WEBSOCKET -}}
  104. "websocket";
  105. "smacks"; -- XEP-0198: Stream Management
  106. {{ end -}}
  107. {{ if .Env.XMPP_MODULES }}
  108. "{{ join "\";\n\"" (splitList "," .Env.XMPP_MODULES) }}";
  109. {{ end }}
  110. }
  111. main_muc = '{{ $VISITORS_MUC_PREFIX }}.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}';
  112. shard_name = "{{ $SHARD_NAME }}"
  113. region_name = "{{ $REGION_NAME }}"
  114. release_number = "{{ $RELEASE_NUMBER }}"
  115. {{ if .Env.XMPP_CONFIGURATION -}}
  116. {{ join "\n " (splitList "," .Env.XMPP_CONFIGURATION) }}
  117. {{- end }}
  118. VirtualHost '{{ $XMPP_AUTH_DOMAIN}}'
  119. modules_enabled = {
  120. 'limits_exception';
  121. 'ping';
  122. }
  123. authentication = 'internal_hashed'
  124. Component '{{ $VISITORS_MUC_PREFIX }}.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}' 'muc'
  125. storage = 'memory'
  126. muc_room_cache_size = 10000
  127. restrict_room_creation = true
  128. modules_enabled = {
  129. "muc_hide_all";
  130. "muc_meeting_id";
  131. 'fmuc';
  132. 's2s_bidi';
  133. 's2s_whitelist';
  134. 's2sout_override';
  135. 'muc_max_occupants';
  136. {{ if $ENABLE_SUBDOMAINS -}}
  137. "muc_domain_mapper";
  138. {{ end -}}
  139. {{ if $ENABLE_RATE_LIMITS -}}
  140. "muc_rate_limit";
  141. "rate_limit";
  142. {{ end -}}
  143. {{ if .Env.XMPP_MUC_MODULES -}}
  144. "{{ join "\";\n\"" (splitList "," .Env.XMPP_MUC_MODULES) }}";
  145. {{ end -}}
  146. }
  147. muc_room_default_presence_broadcast = {
  148. visitor = false;
  149. participant = true;
  150. moderator = true;
  151. };
  152. muc_room_locking = false
  153. muc_room_default_public_jids = true
  154. muc_max_occupants = {{ $VISITORS_MAX_VISITORS_PER_NODE}}
  155. muc_access_whitelist = {
  156. "{{ $XMPP_DOMAIN }}";
  157. }
  158. {{ if $ENABLE_RATE_LIMITS -}}
  159. -- Max allowed join/login rate in events per second.
  160. rate_limit_login_rate = {{ $RATE_LIMIT_LOGIN_RATE }};
  161. -- The rate to which sessions from IPs exceeding the join rate will be limited, in bytes per second.
  162. rate_limit_session_rate = {{ $RATE_LIMIT_SESSION_RATE }};
  163. -- The time in seconds, after which the limit for an IP address is lifted.
  164. rate_limit_timeout = {{ $RATE_LIMIT_TIMEOUT }};
  165. -- List of regular expressions for IP addresses that are not limited by this module.
  166. rate_limit_whitelist = {
  167. "127.0.0.1";
  168. {{ range $index, $cidr := (splitList "," $RATE_LIMIT_ALLOW_RANGES) -}}
  169. "{{ $cidr }}";
  170. {{ end -}}
  171. };
  172. rate_limit_whitelist_jids = {
  173. "{{ $JIBRI_RECORDER_USER }}@{{ $XMPP_RECORDER_DOMAIN }}",
  174. "{{ $JIGASI_TRANSCRIBER_USER }}@{{ $XMPP_RECORDER_DOMAIN }}"
  175. }
  176. {{ end -}}
  177. -- The size of the cache that saves state for IP addresses
  178. rate_limit_cache_size = {{ $RATE_LIMIT_CACHE_SIZE }};
  179. muc_rate_joins = 30;
  180. {{ if .Env.XMPP_MUC_CONFIGURATION -}}
  181. {{ join "\n" (splitList "," .Env.XMPP_MUC_CONFIGURATION) }}
  182. {{ end -}}